Perfect Password: Selection, Protection, Authentication
Elsevier, 9 ene. 2006 - 182 páginas
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.
Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements.
A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember.
* Examines the password problem from the perspective of the administrator trying to secure their network
* Author Mark Burnett has accumulated and analyzed over 1,000,000 user passwords and through his research has discovered what works, what doesn't work, and how many people probably have dogs named Spot
* Throughout the book, Burnett sprinkles interesting and humorous password ranging from the Top 20 dog names to the number of references to the King James Bible in passwords
Comentarios de usuarios - Escribir una reseña
LibraryThing ReviewReseña de usuario - markcross - LibraryThing
Made me think of passwords in a completely different way. We all use passwords, even for the ATM or voicemail. We use it so much we practically take it for granted. This book takes a rather simple ... Leer reseña completa
Meet Your Opponent
Is Random Really Random?
Character Diversity Beyond the Alphabet
Password Length Making It Count
Time The Enemy of All Secrets
Living with Passwords
Ten Password Pointers Building Strong Passwords
Another Ten Password Pointers Plus a Bonus Pointer
The Three Rules for Strong Passwords
Celebrate Password Day
The Three Elements of Authentication
Test Your Password
Random Seed Words
The 500 Worst Passwords of All Time
Otras ediciones - Ver todo
15 characters 500 Worst Passwords administrator Alt key bicycle lock brute-force attacks building strong passwords Celebrating Password Day chapter character sets common password complex consider crack your password crackers database dial dictable dictionary attacks dictionary words digits dragon e-mail easier easy to remember encryption example Figure Google guess hackers Here’s hypernym hyponym increase Internet ISBN key loggers keyboard long passwords lowercase letters means memorize method Microsoft multifactor authentication Offline attacks pass phrase password cracking password hashes password length password policies password security passwords.The pattern percent permutations pick plaintext predictable protect punctuation Rainbow Tables random numbers random passwords repetition Rhymes secret questions Security through obscurity simple Solutions someone strategy symbols technique tions Tommy Tutone Top Top Top trillion truly random unique unpredictable uppercase letters users weak passwords Wordlist Words